Hi,

TLS works fine. When switching eap.conf to peap, Freeradius 1.0.0 pre 3
crashes.

I`m using Fedora Core 2 and Windows XP and 2K as Clients.

Any Ideas ?

--- Walking the entire request list ---
Waking up in 6 seconds...
rad_recv: Access-Request packet from host 192.168.1.230:2369, id=185,
length=148
        NAS-IP-Address = 192.168.1.230
        NAS-Port-Type = Wireless-802.11
        Service-Type = 1
        Framed-MTU = 1400
        User-Name = "root"
        Calling-Station-Id = "000423763243"
        Called-Station-Id = "0020d803954f"
        State = 0x8830e211070c137fe081eccb9e926c59
        EAP-Message =
0x0206002019001703010015bf59cef4deef7398e4c16fe50b32266f7562000fa4
        Message-Authenticator = 0x9f0d227f4ef431e7e76c07410f2382ba
  Processing the authorize section of radiusd.conf
modcall: entering group authorize for request 5
Invalid operator for item Suffix: reverting to '=='
Invalid operator for item Suffix: reverting to '=='
Invalid operator for item Suffix: reverting to '=='
  modcall[authorize]: module "preprocess" returns ok for request 5
  modcall[authorize]: module "chap" returns noop for request 5
  rlm_eap: EAP packet type response id 6 length 32
  rlm_eap: No EAP Start, assuming it's an on-going EAP conversation
  modcall[authorize]: module "eap" returns updated for request 5
    rlm_realm: No '@' in User-Name = "root", looking up realm NULL
    rlm_realm: No such realm "NULL"
  modcall[authorize]: module "suffix" returns noop for request 5
  modcall[authorize]: module "files" returns notfound for request 5
  modcall[authorize]: module "mschap" returns noop for request 5
modcall: group authorize returns updated for request 5
  rad_check_password:  Found Auth-Type EAP
auth: type "EAP"
  Processing the authenticate section of radiusd.conf
modcall: entering group authenticate for request 5
  rlm_eap: Request found, released from the list
  rlm_eap: EAP/peap
  rlm_eap: processing type peap
  rlm_eap_peap: Authenticate
  rlm_eap_tls: processing TLS
  eaptls_verify returned 7
  rlm_eap_tls: Done initial handshake
  eaptls_process returned 7
  rlm_eap_peap: EAPTLS_OK
  rlm_eap_peap: Session established.  Decoding tunneled attributes.
  rlm_eap_peap: Identity - root
  rlm_eap_peap: Tunneled data is valid.
  PEAP: Got tunneled identity of root
  PEAP: Setting default EAP type for tunneled EAP session.
Segmentation fault

Regards,
Robert M. Albrecht


- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to